Thursday, August 22, 2019
Call us Toll Free (USA): 1-833-844-9468   International: +1-603-280-4451   M-F 8am to 6pm EST
Home News Page 3

News

A flaw in Kaspersky Antivirus allowed tracking its users online

A vulnerability in Kaspersky Antivirus had exposed a unique identifier associated with users to every website they have visited in the past 4 years. A vulnerability in the Kaspersky Antivirus software, tracked as CVE-2019-8286, had exposed a unique identifier associated...

The 5 Biggest Corporate Data Security Threats

By Arman Sadeghi, Founder & CEO, All Green Recycling Retail giant Target was robbed of 70 million credit card numbers, and the British Ministry of Justice was fined over $230,000 for leaked prison records on a stolen portable hard drive... ...so...

Data Spill – An Everyday Threat to National Security

By Michael Waksman, CEO, Jetico Inc. Oy Data has a frequent troublesome habit of residing somewhere it shouldn't. In national security spaces, classified data can end up on unclassified or lower-level classification systems. This is known as a data spill. Other...

Security vs. Privacy

By Milica D. Djekic This new time would not deal with the security only, but rather with the privacy as well. As it’s known, security is a process of maintaining the acceptable level of risk. So, in other words –...

Flaws in HTTP/2 implementations expose servers to DoS attacks

Experts at Netflix and Google discovered eight denial-of-service (DoS) vulnerabilities affecting various HTTP/2 implementations. Researchers from Netflix and Google discovered eight denial-of-service (DoS) flaws affecting various HTTP/2 implementations. Some of the flawed implementations belong to tech giants such as Amazon,...

What’s the Matter with S3?

Public cloud breaches are becoming more frequent. Can anything be done? By Adam Conway Another week, another story about how data stored in the public cloud has been stolen or left unprotected. This week it was the account PINs of 6...

How to Protect Yourself from Identity Theft Online?

Protection Against Online Identity Theft By Manish Bhickta, Product Marketer, Stellar Data Recovery Wish to acquaint yourself with Online Identity Theft, its types, its preventive measures to remain protected, and the ways using which you can get rid of it if...

A Potential Shift in Enforcement Priorities for the FTC

By Julie O’Neill, Partner, Privacy + Data Security Group, Morrison & Foerster During the course of a long-running data security action against a medical testing laboratory, the Federal Trade Commission (FTC) has been steadfast in its position that legally actionable...

Flaws in 4G Routers of various vendors put millions of users at risk

Security expert discovered multiple flaws in 4G routers manufactured by several companies, some of them could allow attackers to take over the devices. G Richter, a security researcher at Pen Test Partners discovered multiple vulnerabilities 4G routers manufactured by different...

The Need For Centralized Critical Event Management

By Imad Mouline, Chief Technology Officer, Everbridge Global threats have increased in complexity and unpredictability. The critical events we face today are more frequent and unfortunately, costlier and potentially life-threatening, creating a challenge for outdated emergency and IT incident communication...

STAY CONNECTED

36,264FansLike
55,564FollowersFollow
Show Buttons
Hide Buttons